Behavioral task
behavioral1
Sample
bf26d4b4aaa62d3d68b90663735daa44_JaffaCakes118.doc
Resource
win7-20240708-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
bf26d4b4aaa62d3d68b90663735daa44_JaffaCakes118.doc
Resource
win10v2004-20240802-en
10 signatures
150 seconds
General
-
Target
bf26d4b4aaa62d3d68b90663735daa44_JaffaCakes118
-
Size
90KB
-
MD5
bf26d4b4aaa62d3d68b90663735daa44
-
SHA1
c97db27b36caaeb2f7ae27be54e64fb646d6b73b
-
SHA256
0a8fe9bd0bf00906214b8db52fb93fa58750a417a2e5020f1c00cdfcfecb91f9
-
SHA512
94767e28457e78a80f672c0f8d96a97d961abe1e98189ed818902d55fbf96263b62d8d630964a272e40c02d92f11e94bfc140712a485f4ce4c479caf21604a50
-
SSDEEP
1536:+Bocn1kp59gxBK85fBnx+amHIUAHcAdAbRjf7ZD+gB:X41k/W487oRnZlB
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
bf26d4b4aaa62d3d68b90663735daa44_JaffaCakes118.doc windows office2003
vUOGvVsqYQkM